Protecting Routes with Middleware

The Descope Next.js SDK provides authentication middleware to enforce secure access control across application routes. Middleware allows authentication checks before requests reach a page or API, ensuring only authorized users can proceed.

Although the middleware isn't strictly required, it is recommended for consistent and secure route protection.

This guide covers:

  • Configuring authentication middleware
  • Defining public and private routes
  • Using wildcard paths for flexible route protection
  • Redirecting unauthenticated users
  • Handling session expiration and forced re-authentication

Setting Up Authentication Middleware

In Next.js, middleware intercepts requests before they reach a route. The Descope SDK provides authMiddleware() to enforce authentication for protected pages.

Creating Middleware

Create a middleware.ts file in the root of your Next.js project.

import { authMiddleware } from '@descope/nextjs-sdk/server';
 
export default authMiddleware({
  projectId: process.env.NEXT_PUBLIC_DESCOPE_PROJECT_ID,
  redirectUrl: '/sign-in',
  publicRoutes: ['/home', '/about'],
  privateRoutes: ['/dashboard', '/profile'],
});
 
export const config = {
  matcher: ['/((?!.+\\.[\\w]+$|_next).*)', '/', '/(api|trpc)(.*)'],
};

How Middleware and the SDK Works

  • All routes are private by default.
  • Public routes are explicitly defined using publicRoutes.
  • Private routes can be defined using privateRoutes, but if both publicRoutes and privateRoutes are used, privateRoutes is ignored.
  • Middleware redirects unauthenticated users to redirectUrl.

The Session Header

When a request is processed, the middleware:

  1. Extracts the session JWT from the request (Authorization header or DS cookie).
  2. Validates the JWT using Descope's backend.
  3. Encodes session data as a Base64 JSON string.
  4. Attaches the session data to the request headers under the X-Descope-Session header.
const addSessionToHeadersIfExists = (
  headers: Headers,
  session: AuthenticationInfo | undefined
): Headers => {
  if (session) {
    const requestHeaders = new Headers(headers);
    requestHeaders.set(
      DESCOPE_SESSION_HEADER,
      Buffer.from(JSON.stringify(session)).toString('base64')
    );
    return requestHeaders;
  }
  return headers;
};

After validation, the middleware modifies the request headers to include the session data before forwarding the request.

return NextResponse.next({
  request: { headers: addSessionToHeadersIfExists(req.headers, session) }
});

This allows server-side components and API routes to access authentication details without manually validating the session again.

Session Storage Differences Between Next.js and React/JS

By default, the Descope Next.js SDK stores the DS (Descope Session) in a cookie, whereas the Web JS SDK and React SDK store it in localStorage. This means:

  • Next.js SDK (cookies):

    • Accessible via JavaScript.
    • Stored securely in a secure, samesite=strict cookie.
    • Automatically included in server-side requests.
    • Persistent across browser sessions.
  • React SDK (local storage):

    • Accessible via JavaScript.
    • Requires manual handling for secure transmission to the backend.

This allows client-side applications to use the token for making authenticated API requests.

Using Wildcard Paths for Route Protection

Wildcard paths (*) simplify route protection by applying authentication requirements to entire sections of an application.

Protecting API Endpoints

export default authMiddleware({
  privateRoutes: ['/api/*'],
});

Protecting an Admin Section

export default authMiddleware({
  privateRoutes: ['/admin/*'],
});

Redirecting Unauthenticated Users

By default, unauthenticated users are redirected to /sign-in. To customize this behavior, update redirectUrl.

Redirecting to a Custom Login Page

export default authMiddleware({
  redirectUrl: '/auth/login',
});

Controlling Log Levels in the Descope Next.js SDK

The Descope Next.js SDK allows you to control logging levels for debugging and monitoring authentication-related events. This is useful for diagnosing issues during development and ensuring secure authentication flows in production.

Supported Log Levels

The logLevel option in authMiddleware() can be set to one of the following values:

Log LevelDescription
debugLogs detailed debug messages, useful for troubleshooting authentication flows.
infoLogs general informational messages, such as successful logins and token validations.
warnLogs warnings about potential misconfigurations or non-critical issues.
errorLogs only critical authentication failures and errors.

Configuring Log Levels

You can set the log level when defining your middleware:

import { authMiddleware } from '@descope/nextjs-sdk/server';
 
export default authMiddleware({
  projectId: process.env.NEXT_PUBLIC_DESCOPE_PROJECT_ID,
  logLevel: 'debug', // Change to 'info', 'warn', or 'error' as needed
  redirectUrl: '/sign-in',
});

Example: Debugging Authentication

Setting the log level to debug provides detailed output in the console, helping to trace authentication issues.

import { authMiddleware } from '@descope/nextjs-sdk/server';
 
export default authMiddleware({
  projectId: process.env.NEXT_PUBLIC_DESCOPE_PROJECT_ID,
  logLevel: 'debug', // Enables verbose debugging logs
  redirectUrl: '/sign-in',
});

Sample Debug Logs

When logLevel: 'debug' is set, you might see logs like:

Auth middleware starts
Auth middleware finishes

If an error occurs:

Auth middleware starts
Failed to validate JWT: Failed to validate JWT  [JWSInvalid: Compact JWS must be a string or Uint8Array] {
    code: 'ERR_JWS_INVALID',
    name: 'JWSInvalid'
}
Redirecting to /sign-in
  • Development: Use debug or info to get detailed logs while debugging authentication.
  • Production: Use warn or error to log only critical authentication failures.

For full implementation details, check the sample projects:

Was this helpful?